You are on page 1of 57

FIR MANAGEMENT SYSTEM

A Project Report submitted to


Bishop Heber College (Autonomous), Tiruchirappalli affiliated to
Bharathidasan University, Tiruchirappalli – 620024 in partial
fulfillment of the requirements for the award of the degree of

Bachelor of Vocation in Information Technology

by
ABISNATH
(Register No: 195915101)

Under the guidance of


Mrs. K. SIVARANJANI, M.Sc., M. Phil., SET., NET.,

Department of Information Technology


Bishop Heber College (Autonomous)

(Nationally Re-accredited with „A‟ Grade by NAAC with a CGPA of 3.58 out of 4)
(Recognized by UGC as “College of Excellence”)
Tiruchirappalli – 620 017

NOVEMBER 2019

1
Department of Information Technology
Bishop Heber College (Autonomous)
Tiruchirappalli – 620 017, Tamilnadu, India
Phone No. : 0431 – 277 0136

CERTIFICATE

This Viva-Voce examination for the candidate ABISNATH.S


(Reg No:195915101)
was held on

Signature of the HOD

Examiners:
1.

2.

2
Mrs. K. SIVARANJANI, M.Sc., M. Phil., SET., NET.,
Associate Professor
Department of Information Technology, Bishop
Heber College (Autonomous), Tiruchirappalli –
620 017.

Date:

CERTIFICATE

This is to certify that the project work entitled “MODERN PERIODIC


TABLE” is a bonafide work done under my supervision by ABISNATH.S(Reg. No.
195915101) and submitted to Bishop Heber College(Autonomous), Tiruchirappalli –
620 017 in partial fulfillment of the requirements for the award of the degree of
Bachelor of Vocation in Information Technology during the even semester of the
academic year (2019 – 2022).

Signature of the Guide

DECLARATION

3
I hereby declare that the work presented in this project work report is the
original work done by me under the guidance of Mrs. K. SIVARANJANI,

M.Sc., M. Phil., SET., NET., Associate Professor and Head, Department of


Information Technology, Bishop Heber College (Autonomous), Tiruchirapalli-620
017 and has not been included in any other project work submitted for any other
degree.

Name of the Candidate : S.ABISNATH

Register Number : 195915101

Semester : FIRST

Academic Year : 2019– 2022

Course code : U19ITPJ1

Signature of the Candidate

ACKNOWLEDGEMENTS

4
First of all, I would thank THE GOD ALMIGHTY for the abundant grace,
good health and knowledge to do this Project.

I express my sincere gratitude to Dr. D. PAUL DHAYABARAN, M. Sc., M.


Phil., PGDCSA, Ph.D., Principal, Bishop Heber College (Autonomous),
Tiruchirapalli for providing an opportunity to pursue this programme in our College.

I am highly indebted to Dr. J JOHN RAYBIN JOSE, M.Sc., M.C.A.,


M.Phil., PGDCSA., Ph.d., SET, Associate Professor and Head, Department of
Information Technology, Bishop Heber College (Autonomous), Tiruchirapalli for
permitting me to carry out this project and guiding me to the project successfully.

I acknowledge my respected professor Mrs. K. SIVARANJANI, M.Sc., M.


Phil., SET., NET., Associate professor, Department of Information Technology for
equipping me with the theoretical and practical knowledge required for completing
this project successfully. I also thank all the staff members who have contributed
directly or indirectly in the successful completion of this project work.

I record my deep sense of gratitude to my beloved parents and my friends for


their encouragement and moral support extended during the period of my project.

S.ABISNATH

5
SYNOPSIS

The Project title is “ MODERN PERIODIC TABLE”, also known as the periodic
table of elements, is a tabular display of the chemical elements, which are arranged by
atomic number, electron configuration, and recurring chemical properties. The
structure of the table shows periodic trends. The seven rows of the table, called
periods, generally have metals on the left and non-metals on the right. The columns,
called groups, contain elements with similar chemical behaviours. Six groups have
accepted names as well as assigned numbers: for example, group 17 elements are the
halogens; and group 18 are the noble gases. Also displayed are four simple rectangular
areas or blocks associated with the filling of different atomic orbitals.

The elements from atomic numbers 1 (hydrogen) through 118 (oganesson) have been
discovered or synthesized, completing seven full rows of the periodic table.[1][2] The
first 94 elements all occur naturally, though some are found only in trace amounts and
a few were discovered in nature only after having first been synthesized.[n 1] Elements
95 to 118 have only been synthesized in laboratories or nuclear reactors.[3] The
synthesis of elements having higher atomic numbers is currently being pursued: these
elements would begin an eighth row, and theoretical work has been done to suggest
possible candidates for this extension. Numerous synthetic radionuclides of naturally
occurring elements have also been produced in laboratories.

6
CONTENT
S. No. PAGE. No.

TITLE

1 INTRODUCTION 1

2 SYSTEM STUDY 2

2.1 Project Description 2

2.1.1 Existing system 2

2.1.2 Proposed system 2

2.2 Requirement Specifications 3

2.2.1 Hardware Requirements 3

2.2.2 Software Requirements 3

3 SYSTEM DESIGN 4

3.1 Logical design 4

3.2 Input design 4

3.3 Output design 5

3.4 Module Description 7

4 SYSTEM DEVELOPMENT 9

4.1 Program Development 9

5 SYSTEM TESTING 27

5.1 Unit Testing 27

5.2 Integration Testing 28

5.3 Validation Testing 29

6 SYSTEM IMPLEMENTATION 31

7 CONCLUSION 36

8 BIBLIOGRAPHY 37

7
1. INTRODUCTION
Dmitri Mendeleev published the first periodic table in 1869. He showed that when the elements
were ordered according to atomic weight, a pattern resulted where similar properties for
elements recurred periodically. Based on the work of physicist Henry Moseley, the periodic table
was reorganized on the basis of increasing atomic number rather than on atomic weight. The
revised table could be used to predict the properties of elements that had yet to be discovered.
Many of these predictions were later substantiated through experimentation. This led to the
formulation of the periodic law, which states that the chemical properties of the elements are
dependent on their atomic numbers.
The periodic table lists elements by atomic number, which is the number of protons in every
atom of that element. Atoms of an atomic number may have varying numbers of neutrons
(isotopes) and electrons (ions), yet remain the same chemical element.

Elements in the periodic table are arranged in periods (rows) and groups (columns). Each of the
seven periods is filled sequentially by atomic number. Groups include elements having the same
electron configuration in their outer shell, which results in group elements sharing similar
chemical properties.

The electrons in the outer shell are termed valence electrons. Valence electrons determine the
properties and chemical reactivity of the element and participate in chemical bonding. The
Roman numerals found above each group specify the usual number of valence electrons.

There are two sets of groups. The group A elements are the representative elements, which
have s or p sublevels as their outer orbitals. The group B elements are the nonrepresentative
elements, which have partly filled d sublevels (the transition elements) or partly filled f
sublevels (the lanthanide series and the actinide series). The Roman numeral and letter
designations give the electron configuration for the valence electrons (e.g., the valence electron
configuration of a group VA element will be s2p3 with 5 valence electrons).

Another way to categorize elements is according to whether they behave as metals or nonmetals.
Most elements are metals. They are found on the left hand side of the table.

8
2. SYSTEM STUDY

System study consists of organizing file and project description. Organization profile
includes the information about a ship details. Project description include existing and proposed
system. Every system is delineated by its spatial and temporal boundaries, surrounded and
influenced by its environment, described by its structure and purpose and expressed in its
functioning. The term system may also refer to criteria that governs structure or behaviour.
Alternatively, and usually in the context of complex social systems, the term is used to describe
the criteria that govern structure or behaviour.

2.1. PROJECT DESCRIPTION


The Modern Periodic Table project is a simple console application built without the use of
graphics. It is developed using the C programming language for the purpose of storing name,
symbol, atomic number, atomic weight, and some important properties as well as to display them
as per requirement of the user.The source code for this project is complete and totally error free,
and we welcome any feedback and suggestions. The C source code is simple and understandable,
and consists of around 600 lines of code.

2.1.1. EXISTING SYSTEM


In the existing system people who want to file a complaint must go to the police
station all by themselves which is time consuming. Police people usually maintain
records manually which is again time consuming and it is difficult to manage those
records. There can be loss of records and important crimes issued which needs to be
solved quickly may get delayed. Major limitations are Time consuming Paper work
needed Loss of records Information about criminals and common people are not
properly maintained.

Advantages:
 Reduced time consumption
 No paper work needed

9
 No loss of records
 Centralized database management

10
2.1.2. PROPOSED SYSTEM

In the proposed system, the process of payments of goods and maintaining the stock,
database of traders are all made computerized. The manual system has some drawbacks which
can be overcome by using our web based software “Crime Management System”. Citizens need
not go to the police station to file a complaint. Police need not have to maintain records manually
since our software maintains all the records with centralized database. Main objectives are
Reduced time consumption No paper work needed No loss of records Centralized database
management Information about criminals and common people is properly maintained Reduce
error scope. So by this project the process of arriving and leaving, payments and stock
maintenance for a “FIR SHIPPING MANAGEMENT” can be processed easily.

Disadvantages:
 Paper work needed
 Loss of records
 Information about criminals and
 common people is not properly maintained

2.2 REQUIREMENT ANALYSIS

Requirements analysis involves frequent communication with system users to determine


specific feature expectations, resolution of conflict or ambiguity in requirements as demanded by
the various users or groups of users, avoidance of feature creep and documentation of all aspects
of the project development process from start to finish. Energy should be directed towards
ensuring that the final system or product conforms to client needs rather than attempting to user
expectations to fit the requirements. Requirements analysis is a team effort that demands a
combination of hardware, software and human factors engineering expertise as well as skills in
dealing with people.

The hardware specification of the Laptop computer system available for developing the
project is given below,

11
2.2.1 Hardware Requirements

Processor : Intel Pentium Corei3

Hard disk : 250GB

RAM : 1GB

Keyboard : Standard QWERTY Keyboard

Mouse : Standard mouse with 2 button

2.2.2. Software Requirements

A software requirement specification (SRS) is a complete description of the behaviour of


the system to be developed. It includes a set of use cases that describe all the interaction the
users will have with the software

Operating System
An operating system is a software that communicate with the hardware and allows other
to run. It comprises the system software, and other utilities. The Operating system used as
platform to develop this project in windows 7 Ultimate and later. It is a multi-user operating
system

Programming Language

The Software application is developed using C. The software name is Dev C++.

12
2.3 SOFTWARE DETAILS

C was originally developed by Dennis Ritchie between 1969 and 1973 at AT & T Bell
Labs, and used to re-implement the UNIX operating system. It has since become one of the most
widely used programming languages of all time, with C compilers from various vendors
available for the majority of existing computer architectures and operating systems. C has been
standardized by the American National Standards Institute (ANSI) since 1989 and subsequently
by the International Organization for Standardization (ISO). C is an imperative (procedural)
language. It was designed to be compiled using a relatively straight forward compiler, to provide
low-level access to memory, to provide language constructs that map efficiently to machine
instructions, and to require minimal run-time support. C was therefore useful for many
applications that had formerly been coded in assembly language, such as in system
programming.

Despite its low-level capabilities, the language was designed to encourage cross-platform
programming. A standards-compliant and portably written C program can be compiled for a very
wide variety of computer platforms and operating systems with few changes to its source code.
The language has become available on a very wide range of platforms, from embedded
microcontrollers to supercomputers.

13
3. SYSTEM DESIGN

System design is the process of defining the architecture, components, modules,


interfaces, and data for a system to satisfy specified requirements. Systems design could be seen
as the application of systems theory to product development.

3.1 LOGICAL DESIGN

Logical design is an abstract concept in computer programming by which programmers


arrange data in a series of logical relationships known as attributes or entities. An entity refers to
a chunk of information, whereas an attribute defines the unique properties of an entity.

START

SELECT AN
OPTION

Search Modify List Delete


Add records
records records records records

END

14
Logical design of fir management system

 This system contains five modules.

 Then Admin checks the records based on their name or fir number.

 Then add convict details.

 In record details are inserted.

3.2 INPUT DESIGN:

START

SELECT AN
OPTION

ADD RECORD

END

Logical design of select add records

 Provide the option to select add record

 The entities are enter in the add record

15
SEARCH RECORD:

START

SELECT AN
OPTION

SEARCH
RECORD

END

Logical design of Search record

 The Convict details are entered based on existing and new employees
and their list.

 The Editing of the convict’s list done by through the admin.

16
LOGICAL DESIGN FOR MODIFY RECORD:

START

SELECT AN
OPTION

MODIFY RECORD

CONVICT’S ENTER ID
NAME

Logical design for modify record


 The modify record module is used to modify the existing record.
 Based on the availability the admin modify the existing record.

17
LOGICAL DESIGN FOR LIST RECORD:

START

SELECT AN
OPTION

LIST RECORD

END

Logical design for list record


 The list record module is used to list the existing or new record.
 Based on the availability the admin list the record.

18
LOGICAL DESIGN FOR DELETE RECORD:

START

SELECT AN
OPTION

DELETE RECORD

PASSWORD

CONVICT NAME

END

Logical design for delete record


 The delete record module is used to delete the existing or new record.
 Based on the availability the admin can delete the record.

19
3.3 OUPUT DESIGN:

ADMIN LOGIN
FIR RECORDS

Output design of the fir management system

20
3.4 MODULE DESCRIPTION
A module is a software component or part of a program that contains one or more routines. One
or more independently developed modules make up a program. An enterprise-level software
application may contain several different modules, and each module serves unique and separate
business operations. Modules make a programmer’s job easy by allowing the programmer to
focus on only one area of the functionality of the software application. Modules are typically
incorporated into the program (software) through interfaces.

MODULES
In module description it contains the following modules
 Add Records
 Search Record
 Modify Record
 List Record
 Delete Record

Add Record
In Add Record all the information about the convict details like their convict no, convict
name, address and contact emergency number details are stored in the file.

Search Record
A new record or existing record can be search through this module to find the convict’s
details quickly using convict name and their ID.

Modify Record
A Stock is a business statement that provides information on the values and quantity of
stock related transaction.

21
List Record
A list of whole fir record can be listed and displayed through this module to list the
convict’s details.

Delete Record
If the conviction were finished, the added record of that convict’s details can be deleted
through this module using the admin password..

22
4. SYSTEM DEVELOPMENT

The Software Development Life Cycle (SDLC), also referred to as the application
development life-cycle, is a term used in systems engineering, information systems and software
engineering to describe a process for planning, creating, testing, and deploying an information
system. The systems development life-cycle concept applies to a range of hardware and software
configurations, as a system can be composed of hardware only, software only, or a combination
of both.

4.1 PROGRAM DEVELOPMENT

SOURCE CODE
#include<stdio.h>

#include<stdlib.h>

#include<conio.h>

#include<string.h>

void addrecord();

void viewrecord();

void editrecord();

void searchrecord();

void deleterecord();

void login();

struct record

char id[10];

char name[30];

char age[6];

char gender[10];

23
char weight[20];

char height[20];

char haircolor[20];

char eyecolor[20];

char crime[40];

char details[20];

char court[20];

char act[20];

char punishment[50];

char faddress[20];

char fir[20];

char emergencyc[20];

char emergencyr[20];

char datearr[20];

} a;

int main()

login();

int ch;

printf("\n\n\t====================================\n");

printf("\t -POLICE FIR RECORD MANAGEMENT-\n");

printf("\t====================================");

while(1)

printf("\n\n\t\t::MAIN MENU::");

printf("\n\n\t\tADD FIR RECORD\t[ENTER-1]");

printf("\n\t\tSEARCH RECORD\t[ENTER-2]");

printf("\n\t\tMODIFY RECORD\t[ENTER-3]");

24
printf("\n\t\tLIST RECORD\t[ENTER-4]");

printf("\n\t\tDELETE RECORD\t[ENTER-5]");

printf("\n\t\tEXIT\t\t[ENTER-6]");

printf("\n\n\t=> ENTER YOUR CHOICE:");

scanf("%d",&ch);

switch(ch)

case 1:

addrecord();

break;

case 2:

searchrecord();

break;

case 3:

editrecord();

break;

case 4:

viewrecord();

break;

case 5:

deleterecord();

break;

case 6:

system("cls");

printf("\n\n\t\tTHANK YOU FOR USING THIS SOFTWARE \n\n\n\n\t\tBROUGHT TO YOU BY code-


projects.org\n\n ");

getch();

exit(0);

25
default:

printf("\nYOU ENTERED WRONG CHOICE.");

printf("\nPRESS ANY KEY TO TRY AGAIN");

getch();

break;

system("cls");

return 0;

void addrecord( )

system("cls");

FILE *fp ;

char another = 'Y' ,id[10];

char filename[30];

int choice;

printf("\n\n\t\t====================================\n");

printf("\t\t\t - ADD RECORDS -");

printf("\n\t\t====================================\n");

printf("\n\n\tENTER FIRST NAME OF CONVICT(To Check whether record exists or not): ");

fflush(stdin);

gets(filename);

fp = fopen ("filename", "ab+" ) ;

if ( fp == NULL )

fp=fopen("filename","wb+");

if(fp==NULL)

26
{

printf("\nSYSTEM ERROR...");

printf("\nPRESS ANY KEY TO EXIT");

getch();

return ;

while ( another == 'Y'|| another=='y' )

choice=0;

fflush(stdin);

printf ( "\tENTER CONVICT CODE(To check whether it matches or not): ");

scanf("%s",id);

rewind(fp);

while(fread(&a,sizeof(a),1,fp)==1)

if(strcmp(a.id,id)==0)

printf("\n\tTHE RECORD ALREADY EXISTS.\n");

choice=1;

if(choice==0)

strcpy(a.id,id);

printf("\n\tENTER NAME OF CONVICT: ");

fflush(stdin);

27
gets(a.name);

printf("\tENTER SEX: ");

gets(a.gender);

fflush(stdin);

printf("\tENTER AGE: ");

gets(a.age);

fflush(stdin);

printf("\tENTER WEIGHT: ");

gets(a.weight);

fflush(stdin);

printf("\tENTER HEIGHT(FT): ");

gets(a.height);

fflush(stdin);

printf("\tENTER HAIRCOLOR: ");

gets(a.haircolor);

fflush(stdin);

printf("\tENTER EYECOLOR: ");

gets(a.eyecolor);

fflush(stdin);

printf("\tENTER FACE DETAILS: ");

gets(a.details);

fflush(stdin);

printf("\tENTER CRIME: ");

gets(a.crime);

fflush(stdin);

printf("\tENTER COURT: ");

gets(a.court);

fflush(stdin);

28
printf("\tACT(under which convicted): ");

gets(a.act);

fflush(stdin);

printf("\tENTER CONVICTION: ");

gets(a.punishment);

fflush(stdin);

printf("\tCOMPLETE ADDRESS OF POLICE STATION: ");

gets(a.faddress);

fflush(stdin);

printf("\tENTER FIR NUMBER: ");

gets(a.fir);

fflush(stdin);

printf("\tENTER EMERGENCY CONTACT: ");

gets(a.emergencyc);

fflush(stdin);

printf("\tENTER RELATION OF EMERGENCY CONTACT WITH CONVICT: ");

gets(a.emergencyr);

fflush(stdin);

printf("\tENTER DATE OF ARREST: ");

gets(a.datearr);

fwrite ( &a, sizeof ( a ), 1, fp ) ;

printf("\nYOUR RECORD IS ADDED...\n");

printf ( "\n\tADD ANOTHER RECORD...(Y/N) \t" ) ;

fflush ( stdin ) ;

another = getch( ) ;

fclose ( fp ) ;

printf("\n\n\tPRESS ANY KEY TO EXIT...");

29
getch();

void searchrecord( )

system("cls");

FILE *fp ;

char id[16],choice,filename[14];

int ch;

printf("\n\n\t\t====================================\n");

printf("\t\t\t- SEARCH RECORDS -");

printf("\n\t\t====================================\n\n");

do

printf("\n\tENTER THE PRISONER NAME TO BE SEARCHED:");

fflush(stdin);

gets(filename);

fp = fopen ( "filename", "rb" ) ;

//system("cls");

printf("\nENTER CONVICT CODE:");

gets(id);

system("cls");

printf("\nTHE WHOLE RECORD IS:");

while ( fread ( &a, sizeof ( a ), 1, fp ) == 1 )

//{

if(strcmpi(a.id,id)==0)

{ printf("\n");

printf("\nCONVICT'S NAME IS: %s",a.name);

30
printf("\nCONVICT'S GENDER IS: %s",a.gender);

printf("\nCONVICT'S AGE IS: %s",a.age);

printf("\nCONVICT'S WEIGHT IS: %s",a.weight);

printf("\nCONVICT'S HEIGHT IS: %s",a.height);

printf("\nCONVICT'S HAIRCOLOR IS: %s",a.haircolor);

printf("\nCONVICT'S EYECOLOR IS: %s",a.eyecolor);

printf("\nCONVICT'S CRIME IS: %s",a.crime);

printf("\nFACE DETAIL: %s",a.details);

printf("\nCOURT IS: %s",a.court);

printf("\nACT IS: %s",a.act);

printf("\nPRISONER'S CONVICTION IS: %s",a.punishment);

printf("\nADDRESS OF POLICE STATION: %s",a.faddress);

printf("\nFIR NUMBER IS: %s",a.fir);

printf("\nCONVICT'S EMERGENCY CONTACT IS: %s",a.emergencyc);

printf("\nRELATION OF EMERGENCY CONTACT WITH CONVICT IS: %s",a.emergencyr);

printf("\nARRESTED DATE: %s",a.datearr);

printf("\n");

// }

printf("\n\nWOULD YOU LIKE TO CONTINUE VIEWING...(Y/N):");

fflush(stdin);

scanf("%c",&choice);

while(choice=='Y'||choice=='y');

fclose ( fp) ;

getch();

return ;

getch();

31
}

void editrecord()

system("cls");

FILE *fp ;

char id[10],choice,filename[14];

int num,count=0;

printf("\n\n\t\t====================================\n");

printf("\t\t\t- MODIFY RECORDS -");

printf("\n\t\t====================================\n\n");

do

printf("\n\tENTER THE CONVICT'S' NAME TO BE EDITED:");

fflush(stdin);

gets(filename);

printf("\n\tENTER ID:");

gets(id);

fp = fopen ( "filename", "rb+" ) ;

/*if ( fp == NULL )

printf( "\nRECORD DOES NOT EXIST:" ) ;

printf("\nPRESS ANY KEY TO GO BACK");

getch();

return;

}*/

while ( fread ( &a, sizeof ( a ), 1, fp ) == 1 )

if(strcmp(a.id,id)==0)

32
{

printf("\nYOUR OLD RECORD WAS AS:");

printf("\nCONVICT'S NAME: %s",a.name);

printf("\nCONVICT'S SEX: %s",a.gender);

printf("\nCONVICT'S AGE: %s",a.age);

printf("\nCONVICT'S WEIGHT: %s",a.weight);

printf("\nCONVICT'S HEIGHT: %s",a.height);

printf("\nCONVICT'S HAIRCOLOR: %s",a.haircolor);

printf("\nCONVICT'S EYECOLOR: %s",a.eyecolor);

printf("\nCONVICT'S CRIME: %s",a.crime);

printf("\nFACE DETAILS: %s",a.details);

printf("\nCOURT: %s",a.court);

printf("\nCONVICT'S ACT: %s",a.act);

printf("\nCONVICT'S CONVICTION: %s",a.punishment);

printf("\nADDRESS OF POLICE STATION: %s",a.faddress);

printf("\nFIR NUMBER: %s",a.fir);

printf("\nCONVICT'S EMERGENCY CONTACT: %s",a.emergencyc);

printf("\nRELATION OF EMERGENCY CONTACT WITH CONVICT: %s",a.emergencyr);

printf("\nARRESTED DATE: %s",a.datearr);

printf("\n\n\t\tWHAT WOULD YOU LIKE TO EDIT..");

printf("\n1.NAME.");

printf("\n2.SEX.");

printf("\n3.AGE.");

printf("\n4.WEIGHT.");

printf("\n5.HEIGHT.");

printf("\n6.HAIRCOLOR.");

printf("\n7.EYECOLOR.");

printf("\n8.CRIME.");

printf("\n9.FACE DETAILS.");

33
printf("\n10.COURT.");

printf("\n11.ACT.");

printf("\n12.CONVICTION.");

printf("\n13.ADDRESS OF POLICE STATION.");

printf("\n14.FIR NUMBER.");

printf("\n15.EMERGENCY CONTACT.");

printf("\n16.RELATION OF EMERGENCY CONTACT.");

printf("\n17.ARRESTED DATE.");

printf("\n18.WHOLE RECORD.");

printf("\n19.GO BACK TO MAIN MENU.");

do

printf("\n\tENTER YOUR CHOICE:");

fflush(stdin);

scanf("%d",&num);

fflush(stdin);

switch(num)

case 1:

printf("\nENTER THE NEW DATA:");

printf("\nNAME:");

gets(a.name);

break;

case 2:

printf("\nENTER THE NEW DATA:");

printf("\nSEX:");

gets(a.gender);

break;

case 3:

34
printf("\nENTER THE NEW DATA:");

printf("\nAGE:");

gets(a.age);

break;

case 4:

printf("\nENTER THE NEW DATA:");

printf("\nWEIGHT:");

gets(a.weight);

break;

case 5:

printf("ENTER THE NEW DATA:");

printf("\nHEIGHT:");

gets(a.height);

break;

case 6:

printf("ENTER THE NEW DATA:");

printf("\nHAIRCOLOR:");

gets(a.haircolor);

break;

case 7:

printf("ENTER THE NEW DATA:");

printf("\nEYECOLOR:");

gets(a.eyecolor);

break;

case 8:

printf("ENTER THE NEW DATA:");

printf("\nCRIME:");

gets(a.crime);

break;

35
case 9:

printf("ENTER THE NEW DATA:");

printf("\nFACE DETAILS:");

gets(a.details);

break;

case 10:

printf("ENTER THE NEW DATA:");

printf("\nCOURT:");

gets(a.court);

break;

case 11:

printf("ENTER THE NEW DATA:");

printf("\nACT:");

gets(a.act);

break;

case 12:

printf("ENTER THE NEW DATA:");

printf("\nCONVICTION:");

gets(a.punishment);

break;

case 13:

printf("ENTER THE NEW DATA:");

printf("\nADDRESS OF POLICE STATION:");

gets(a.faddress);

break;

case 14:

printf("ENTER THE NEW DATA:");

printf("\nFIR NUMBER:");

gets(a.fir);

36
break;

case 15:

printf("ENTER THE NEW DATA:");

printf("\nEMERGENCY CONTACT:");

gets(a.emergencyc);

break;

case 16:

printf("ENTER THE NEW DATA:");

printf("\nRELATION OF EMERGENCY CONTACT:");

gets(a.emergencyr);

break;

case 17:

printf("ENTER THE NEW DATA:");

printf("\nARRESTED DATE:");

gets(a.emergencyc);

break;

case 18:

printf("ENTER THE NEW DATA:");

printf("\tCONVICT'S NAME:");

gets(a.name);

printf("\tSEX:");

gets(a.gender);

printf("\tAGE:");

gets(a.age);

printf("\tWEIGHT:");

gets(a.weight);

printf("\tHEIGHT:");

gets(a.height);

printf("\tHAIRCOLOR:");

37
gets(a.haircolor);

printf("\tEYECOLOR:");

gets(a.eyecolor);

printf("\tCRIME:");

gets(a.age);

printf("\tFACE DETAILS:");

gets(a.details);

printf("\tCOURT:");

gets(a.court);

printf("\tACT:");

gets(a.act);

printf("\tCONVICTION:");

gets(a.punishment);

printf("\tADDRESS OF POLICE STATION:");

gets(a.faddress);

printf("\tFIR NUMBER:");

gets(a.fir);

printf("\tEMERGENCY CONTACT:");

gets(a.emergencyc);

printf("\tRELATION OF EMERGENCY CONTACT WITH CONVICT:");

gets(a.emergencyr);

printf("\tARRESTED DATE:");

gets(a.datearr);

break;

case 19:

printf("\nPRESS ANY KEY TO GO BACK...\n");

getch();

return ;

break;

38
default:

printf("\nYOU TYPED SOMETHING ELSE...TRY AGAIN\n");

break;

while(num<1||num>20);

fseek(fp,-sizeof(a),SEEK_CUR);

fwrite(&a,sizeof(a),1,fp);

fseek(fp,-sizeof(a),SEEK_CUR);

fread(&a,sizeof(a),1,fp);

choice=5;

break;

if(choice==5)

system("cls");

printf("\n\t\tEDITING COMPLETED...\n");

printf("--------------------\n");

printf("THE NEW RECORD IS:\n");

printf("--------------------\n");

printf("\nCONVICT'S NAME IS: %s",a.name);

printf("\nCONVICT'S SEX IS: %s",a.gender);

printf("\nCONVICT'S AGE IS: %s",a.age);

printf("\nCONVICT'S WEIGHT IS: %s",a.weight);

printf("\nCONVICT'S HEIGHT IS: %s",a.height);

printf("\nCONVICT'S HAIRCOLOR IS: %s",a.haircolor);

printf("\nCONVICT'S EYECOLOR IS: %s",a.eyecolor);

printf("\nCONVICT'S CRIME IS: %s",a.crime);

39
printf("\nFACE DETAILS: %s",a.details);

printf("\nCOURT IS: %s",a.court);

printf("\nACT: %s",a.act);

printf("\nCONVICT'S CONVICTION IS: %s",a.punishment);

printf("\nADDRESS OF POLICE STATION: %s",a.faddress);

printf("\nFIR NUMBER: %s",a.fir);

printf("\nCONVICT'S EMERGENCY CONTACT IS: %s",a.emergencyc);

printf("\nRELATION OF EMERGENCY CONTACT WITH CONVICT IS: %s",a.emergencyr);

printf("\nARRESTED DATE: %s",a.datearr);

fclose(fp);

printf("\n\n\tWOULD YOU LIKE TO EDIT ANOTHER RECORD.(Y/N)");

scanf("%c",&choice);

count++;

else

printf("\nTHE RECORD DOES NOT EXIST::\n");

printf("\nWOULD YOU LIKE TO TRY AGAIN...(Y/N)");

scanf("%c",&choice);

while(choice=='Y'||choice=='y');

fclose ( fp ) ;

printf("\tPRESS ENTER TO EXIT EDITING MENU.");

getch();

40
}

void viewrecord()

system("cls");

FILE *fp;

//struct record a;

char filename[30];

printf("\n\n\t\t====================================\n");

printf("\t\t\t - LIST RECORDS -");

printf("\n\t\t====================================\n");

fp=fopen("filename","rb");

rewind(fp);

while((fread(&a,sizeof(a),1,fp))==1)

printf("\n\n\t\t::PRESS ENTER TO VIEW MORE RECORDS!::\n");

printf("\nCONVICT'S NAME IS: %s",a.name);

printf("\nCONVICT'S SEX IS: %s",a.gender);

printf("\nCONVICT'S AGE IS: %s",a.age);

printf("\nCONVICT'S WEIGHT IS: %s",a.weight);

printf("\nCONVICT'S HEIGHT IS: %s",a.height);

printf("\nCONVICT'S HAIRCOLOR IS: %s",a.haircolor);

printf("\nCONVICT'S EYECOLOR IS: %s",a.eyecolor);

printf("\nCONVICT'S CRIME IS: %s",a.crime);

printf("\nFACE DETAILS: %s",a.details);

printf("\nCOURT IS: %s",a.court);

printf("\nACT: %s",a.act);

printf("\nCONVICT'S CONVICTION IS: %s",a.punishment);

printf("\nADDRESS OF POLICE STATION: %s",a.faddress);

41
printf("\nFIR NUMBER: %s",a.fir);

printf("\nCONVICT'S EMERGENCY CONTACT IS: %s",a.emergencyc);

printf("\nRELATION OF EMERGENCY CONTACT WITH CONVICT IS: %s",a.emergencyr);

printf("\nARRESTED DATE: %s",a.datearr);

getch();

fclose(fp);

getch();

void deleterecord( )

system("cls");

FILE *fp,*ft ;

struct record file ;

char filename[15],another = 'Y' ,id[16];;

int choice,check;

int j=0;

char pass[8];

printf("\n\n\t\t====================================\n");

printf("\t\t\t- DELETE RECORDS -");

printf("\n\t\t====================================\n\n");

printf("\nENTER PASSWORD\n");

int i;

42
for( i=0;i<4;i++)

pass[i]=getch();

printf("*");

if (strcmpi(pass,"pass")==0)

printf("\n\t\t*ACCESS GRANTED*\n\n");

while ( another == 'Y' || another == 'y' )

printf("\n\tENTER THE NAME OF CONVICT TO BE DELETED:");

fflush(stdin);

gets(filename);

fp = fopen ("filename", "rb" ) ;

if ( fp == NULL )

printf("\nTHE FILE DOES NOT EXIST");

printf("\nPRESS ANY KEY TO GO BACK.");

getch();

return ;

ft=fopen("temp","wb");

if(ft==NULL)

printf("\nSYSTEM ERROR");

printf("\nPRESS ANY KEY TO GO BACK");

getch();

43
return ;

printf("\n\tENTER THE ID OF RECORD TO BE DELETED:");

fflush(stdin);

gets(id);

while(fread(&file,sizeof(file),1,fp)==1)

if(strcmp(file.id,id)!=0)

fwrite(&file,sizeof(file),1,ft);

fclose(ft);

fclose(fp);

remove("filename");

rename("temp","filename");

printf("\nDELETED SUCCESFULLY...");

getch();

printf("\n\tDO YOU LIKE TO DELETE ANOTHER RECORD.(Y/N):");

fflush(stdin);

scanf("%c",&another);

printf("\n\n\tPRESS ANY KEY TO EXIT...");

getch();

else

printf("\nSorry!Invalid password\n");

exit(0);

44
}

void login()

int a=0,i=0;

char uname[10],c=' ';

char pword[10],code[10];

char user[10]="user";

char pass[10]="pass";

do

printf("\n ====================== LOGIN FORM ====================== \n");

printf(" \n ENTER USERNAME:-");

scanf("%s", &uname);

printf(" \n ENTER PASSWORD:-");

while(i<10)

pword[i]=getch();

c=pword[i];

if(c==13) break;

else printf("*");

i++;

pword[i]='\0';

//char code=pword;

i=0;

//scanf("%s",&pword);

if(strcmp(uname,"user")==0 && strcmp(pword,"pass")==0)

45
printf(" \n\n\n WELCOME TO POLICE FIR RECORD MANAGEMENT SYSTEM !! YOUR LOGIN IS
SUCCESSFUL");

printf("\n\n\n\t\t\tPress any key to continue...");

getch();//holds the screen

break;

else

printf("\n SORRY !!!! LOGIN IS UNSUCESSFUL");

a++;

getch();//holds the screen

system("cls");

while(a<=2);

if (a>2)

printf("\nSorry you have entered the wrong username and password for four times!!!");

getch();

system("cls");

46
5. SYSTEM TESTING

System testing is the process of evaluation a software item to detect differences between
given input and expected output. Also, to assess the loan processing. Testing assesses the quality
of the product. Software testing is a process that should be done during the development process.
In other words, software testing is a verification and validation process.

5.1 UNIT TESTING

‘Unit testing begins at the vertex of the spiral and concentrates on each unit of the software as
implemented in source code. Initially test focus on each module individually, assuring that it
functions properly as a unit. Hence the name is unit testing. Unit testing makes heavy use of
white box testing techniques, exercising specific paths in a module’s control structure to ensure
complete coverage and maximum error detection. Unit testing focuses verification effort on the
smallest unit of software design the module.
Main Menu:

47
5.2 INTEGRATION TESTING

Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. The combination of components is correct and consistent.
Integration testing is specifically aimed at exposing the problems that arise from the combination
of components. In this testing the each and every module are linked together by using the data to
be transfer from one module field to another.

5.3 VALIDATION TESTING

Validation testing is the process of ensuring if the tested and developed software satisfies
the client /user needs. The business requirement logic or scenarios have to be tested in detail. All
the critical functionalities of an application must be tested here.

48
6. SYSTEM IMPLEMENTATION

Implementation is the final step of the project when the theoretical design is turned out
into a working system. Thus, it can be consider being the most critical stage in achieving a
successful new system and in giving the user, confidence that the new system will work and be
effective. The main objective of this user manual is to introduce the user with the available
facilities in the Download Manager. It provides a conceptual overview of the functioning of the
system and the detailed discussion and reports. This user manual is divided into following
logical parts:
1. Getting Started.
2. Functioning of the system.
The information regarding how one can start with the Download Manager and how to
select appropriate menus available on the main screen can be seen and Find in the Getting
Started portion.
The Functioning of the system part deals with the description of the purpose of each of
the menu items and screens. It also describes the functioning of the system i.e. where to input
data, how to process it and the detailed information about the reports and their printing. This
portion also describes the purpose of each input screen used in the system. The error messages
and their explanations and appropriate actions to be taken is handled by Trouble Shooting part
of the user manual of this document.
Getting Started:
To start the Download Manager, the steps to be followed are:
1. Switch ON the terminal / computer.
2. Windows is loaded and among various icons on the desktop, double clicks the Download
Manager Icon.

49
Screenshots :
Admin page:

Fig 6.1 Admin page

Main Page:

Fig 6.2 Main Page


50
Add Fir Record:

Fig 6.3 Add record Page

Search Fir Record:

Fig 6.4 Search record Page

51
Modify Fir Record:

Fig 6.5 Modify record Page

Fig 6.6 Modify record Page

52
List Fir Record:

Fig 6.7 List record Page


Delete Fir Record:

Fig 6.8 Delete record Page


53
7. CONCLUSION

This project entitled “FIR MANAGEMENT SYSTEM “has been proposed to be


implementing to replace the manual system. The developed system accomplishes all the
objectives stated for the change of the system. The outputs produced seem to satisfy all the users
but it will definitely take to look forwarded for the real consequence the new system could
produce. This project was made user friendly by the use of DEVC++ enabling the user to interact
easily with the database. It’s also enabled the platform to serve the needs of emerging
information technology trends and needs.
Police investigation follows most F.I.Rs. For a non-cognisable
offense an entry in a community service register is made. Each F.I.R. is important as it sets the
process of criminal justice in motion. It is only after the F.I.R. is registered in the police station
that the police take up investigation of most types of cases. Anyone who knows about the
commission of a cognizable offence, including police officers, can file an F.I.R. In the existing
system people who want to file a complaint must go to the police station all by themselves which
is time consuming. Police people usually maintain records manually which is again time
consuming and it is difficult to manage those records.

54
8. BIBOLOGRAPHY

Reference books:

1. Brian W. Kernighan and Dennis M. Ritchie , ”The C Programing Language”, 2nd

Edition, PHI publication,2014.

2. David Griffiths, Head “FIRST”,4th edition O, Reilly publication ,2015.

3. E. Balagurusamy,”Programing in ANSI C”, 2nd Edition, 2014..

4. Herbert Schildt,” C The complete Reference”, 4th Edition, 2013.

5. Yashavant Kanetkar,”Let Us C”, 13th Edition, BPB Publication, 2013.

Reference websites:

1. http://www.cprogramming.com/

2. http://www.linuxtopia.org/online_books/

3. http://www.mycplus.com/

4. http://einstein.drexel.edu/courses/Comp_Phys/General/C_basics

5. http://www2.its.strath.ac.uk/courses/c/

6. http://stackoverflow.com/

55
56
57

You might also like